Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Otto E. Eckert power plant operated by the Lansing Board of Water and Light
binary 65473 960 720

lock

FBI: Ransomware threat at all-time high; how to protect company jewels

Ransomware has many names -- Cryptowall, CryptoLocker, Reveton to name a few – and all are bad news for businesses...“Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at...

blockchain code

IBM offers advice on how to secure blockchain in the cloud

Cloud providers hosting the blockchain secure transactions technology should take additional security steps to protect those records, IBM recommends

Digital Key, security, encryption

Toy maker Maisto’s website pushed growing CryptXXX ransomware threat

The website of toy maker Maisto was infected with malicious code that distributed CryptXXX, a new and increasingly widespread ransomware program.

ransomware

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

ransom note letters

How to tell if you've been hit by fake ransomware

Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily

managed security service providers

Rip up the script when assembling a modern security team

Characteristics that a modern security team needs to combat sophisticated hackers

Android apps (2)

Phishing apps posing as popular payment services infiltrate Google Play

Researchers from security firm PhishLabs found 11 phishing applications hosted on Google Play this year, targeting users of popular online payment services.

spying eye

Supreme Court approves rule change that expands FBI computer search powers

The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.

With some advanced preparation, you can survive a ransomware attack  

Ransomware is running rampant. Prepare for this type of cyber attack now for a better outcome later

confidential

CIA: Learn how to make invisible ink, photos – from 1918

The mostly cryptic documents, from 1917 and 1918 describe secret writing techniques are believed to be the only remaining classified documents from the World War I era. Any documents describing secret writing fall under the CIA’s...

slack icon

Developers leak Slack access tokens on GitHub, putting sensitive business data at risk

Developers from hundreds of companies have included access tokens for their Slack accounts in public projects on GitHub, putting their teams' internal chats and other data at risk.

If I were the next CEO of Symantec – Redux

Challenges from 2014 remain. Symantec must emphasize services, acquire promising startups, establish a partner ecosystem, and streamline products and operations

isis flag graphic

ISIS cyberattack capabilities are unorganized, underfunded -- for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.

Fraud gang targeted large European companies

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man was sentenced Tuesday to 87 months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.

1 iot intro

How to protect digital identity in an IoT world

Everyone and everything has a unique digital identity -- from employees to customers, connected cars to drones – that leaves plenty of data floating around the Internet. Here are four scenarios on how to keep that data safe.

hollywood presbyterian

Paying ransomware is what ills some hospitals

Has the recent wave of ransomware attacks aimed at hospitals been a wakeup call for the healthcare industry? Or is this latest security plague just part of the new normal?

washington jefferson

Government worst of all industries in cybersecurity, says report

Malware, password theft and worker indiscretions are problems for all levels of government. And it may not just be related to lack of money.

US Capitol

In rare unanimous move, House passes bill to protect email and cloud privacy

The U.S. House of Representatives has approved a bill to strengthen privacy protections for email and other data stored in the cloud.

Load More